Key homomorphic PRFs and their applications D Boneh, K Lewi, H Montgomery, A Raghunathan
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
313 2013 Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation D Boneh, K Lewi, M Raykova, A Sahai, M Zhandry, J Zimmerman
Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference …, 2015
264 2015 Order-revealing encryption: New constructions, applications, and lower bounds K Lewi, DJ Wu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
209 2016 Practical order-revealing encryption with limited leakage N Chenette, K Lewi, SA Weis, DJ Wu
Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum …, 2016
189 2016 Function-hiding inner product encryption is practical S Kim, K Lewi, A Mandal, H Montgomery, A Roy, DJ Wu
Security and Cryptography for Networks: 11th International Conference, SCN …, 2018
139 2018 Preventing Unraveling in Social Networks: The Anchored -Core Problem K Bhawalkar, J Kleinberg, K Lewi, T Roughgarden, A Sharma
SIAM Journal on Discrete Mathematics 29 (3), 1452-1475, 2015
126 2015 Constraining pseudorandom functions privately D Boneh, K Lewi, DJ Wu
Public-Key Cryptography–PKC 2017: 20th IACR International Conference on …, 2017
87 2017 Losing weight by gaining edges A Abboud, K Lewi, R Williams
Algorithms-ESA 2014: 22th Annual European Symposium, Wroclaw, Poland …, 2014
59 2014 Exact Weight Subgraphs and the k -Sum Conjecture A Abboud, K Lewi
Automata, Languages, and Programming: 40th International Colloquium, ICALP …, 2013
55 2013 The online metric matching problem for doubling metrics A Gupta, K Lewi
Automata, Languages, and Programming: 39th International Colloquium, ICALP …, 2012
53 2012 5gen: A framework for prototyping applications using multilinear maps and matrix branching programs K Lewi, AJ Malozemoff, D Apon, B Carmer, A Foltzer, D Wagner, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
35 2016 Improved constructions of PRFs secure against related-key attacks K Lewi, H Montgomery, A Raghunathan
Applied Cryptography and Network Security: 12th International Conference …, 2014
28 2014 Distributed auditing proofs of liabilities K Chalkias, K Lewi, P Mohassel, V Nikolaenko
Cryptology ePrint Archive, 2020
13 2020 Iterating Inverse Binary Transducers. K Sutner, K Lewi
J. Autom. Lang. Comb. 17 (2-4), 293-313, 2012
10 * 2012 Aggregating and thresholdizing hash-based signatures using STARKs I Khaburzaniya, K Chalkias, K Lewi, H Malvai
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
8 * 2022 Securing Update Propagation with Homomorphic Hashing K Lewi, W Kim, I Maykov, S Weis
Cryptology ePrint Archive, 2019
7 2019 Parakeet: Practical key transparency for end-to-end encrypted messaging H Malvai, L Kokoris-Kogias, A Sonnino, E Ghosh, E Oztürk, K Lewi, ...
Cryptology ePrint Archive, 2023
4 2023 STROBE: Stake-based Threshold Random Beacons D Beaver, K Chalkias, M Kelkar, LK Kogias, K Lewi, L de Naurois, ...
Cryptology ePrint Archive, 2021
2 2021 Single-Message Credential-Hiding Login K Lewi, P Mohassel, A Roy
Cryptology ePrint Archive, 2020
2 2020 Scaling Backend Authentication at Facebook K Lewi, C Rain, S Weis, Y Lee, H Xiong, B Yang
Cryptology ePrint Archive, 2018
2 2018